blob: b7de9ba099de3922919b9dce12370e64e100e99b [file] [log] [blame]
Tom Rini83d290c2018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Tom Riniaadd3362016-03-16 09:10:08 -04002/*
Andrew F. Davisc1c564a2019-07-16 09:49:38 -04003 * K2x: Secure commands file
Tom Riniaadd3362016-03-16 09:10:08 -04004 *
Andrew F. Davisc1c564a2019-07-16 09:49:38 -04005 * Copyright (C) 2012-2019 Texas Instruments Incorporated - http://www.ti.com/
Tom Riniaadd3362016-03-16 09:10:08 -04006 */
7
Simon Glassdb41d652019-12-28 10:45:07 -07008#include <hang.h>
Andrew F. Davisc1c564a2019-07-16 09:49:38 -04009#include <asm/unaligned.h>
Tom Riniaadd3362016-03-16 09:10:08 -040010#include <common.h>
11#include <command.h>
12#include <mach/mon.h>
Vitaly Andrianove8d740f2017-04-07 10:00:03 -050013#include <spl.h>
Tom Riniaadd3362016-03-16 09:10:08 -040014asm(".arch_extension sec\n\t");
15
Madan Srinivas1d73ce62017-07-17 12:59:15 -050016int mon_install(u32 addr, u32 dpsc, u32 freq, u32 bm_addr)
Tom Riniaadd3362016-03-16 09:10:08 -040017{
18 int result;
19
20 __asm__ __volatile__ (
21 "stmfd r13!, {lr}\n"
22 "mov r0, %1\n"
23 "mov r1, %2\n"
24 "mov r2, %3\n"
Madan Srinivas1d73ce62017-07-17 12:59:15 -050025 "mov r3, %4\n"
Tom Riniaadd3362016-03-16 09:10:08 -040026 "blx r0\n"
Srinivas, Madan94f536f2017-07-17 13:02:02 -050027 "mov %0, r0\n"
Tom Riniaadd3362016-03-16 09:10:08 -040028 "ldmfd r13!, {lr}\n"
29 : "=&r" (result)
Madan Srinivas1d73ce62017-07-17 12:59:15 -050030 : "r" (addr), "r" (dpsc), "r" (freq), "r" (bm_addr)
31 : "cc", "r0", "r1", "r2", "r3", "memory");
Tom Riniaadd3362016-03-16 09:10:08 -040032 return result;
33}
34
35int mon_power_on(int core_id, void *ep)
36{
37 int result;
38
39 asm volatile (
40 "stmfd r13!, {lr}\n"
41 "mov r1, %1\n"
42 "mov r2, %2\n"
43 "mov r0, #0\n"
44 "smc #0\n"
Srinivas, Madan94f536f2017-07-17 13:02:02 -050045 "mov %0, r0\n"
Tom Riniaadd3362016-03-16 09:10:08 -040046 "ldmfd r13!, {lr}\n"
47 : "=&r" (result)
48 : "r" (core_id), "r" (ep)
49 : "cc", "r0", "r1", "r2", "memory");
50 return result;
51}
52
53int mon_power_off(int core_id)
54{
55 int result;
56
57 asm volatile (
58 "stmfd r13!, {lr}\n"
59 "mov r1, %1\n"
60 "mov r0, #1\n"
61 "smc #1\n"
Srinivas, Madan94f536f2017-07-17 13:02:02 -050062 "mov %0, r0\n"
Tom Riniaadd3362016-03-16 09:10:08 -040063 "ldmfd r13!, {lr}\n"
64 : "=&r" (result)
65 : "r" (core_id)
66 : "cc", "r0", "r1", "memory");
67 return result;
68}
Vitaly Andrianove8d740f2017-04-07 10:00:03 -050069
70#ifdef CONFIG_TI_SECURE_DEVICE
71#define KS2_HS_SEC_HEADER_LEN 0x60
72#define KS2_HS_SEC_TAG_OFFSET 0x34
73#define KS2_AUTH_CMD 130
74
75/**
76 * k2_hs_bm_auth() - Invokes security functions using a
77 * proprietary TI interface. This binary and source for
78 * this is available in the secure development package or
79 * SECDEV. For details on how to access this please refer
80 * doc/README.ti-secure
81 *
82 * @cmd: Secure monitor command
83 * @arg1: Argument for command
84 *
85 * returns non-zero value on success, zero on error
86 */
87static int k2_hs_bm_auth(int cmd, void *arg1)
88{
89 int result;
90
91 asm volatile (
92 "stmfd r13!, {r4-r12, lr}\n"
93 "mov r0, %1\n"
94 "mov r1, %2\n"
95 "smc #2\n"
Srinivas, Madan94f536f2017-07-17 13:02:02 -050096 "mov %0, r0\n"
Vitaly Andrianove8d740f2017-04-07 10:00:03 -050097 "ldmfd r13!, {r4-r12, lr}\n"
98 : "=&r" (result)
99 : "r" (cmd), "r" (arg1)
100 : "cc", "r0", "r1", "memory");
101
102 return result;
103}
104
105void board_fit_image_post_process(void **p_image, size_t *p_size)
106{
107 int result = 0;
108 void *image = *p_image;
109
110 if (strncmp(image + KS2_HS_SEC_TAG_OFFSET, "KEYS", 4)) {
111 printf("No signature found in image!\n");
112 hang();
113 }
114
115 result = k2_hs_bm_auth(KS2_AUTH_CMD, image);
116 if (result == 0) {
117 printf("Authentication failed!\n");
118 hang();
119 }
120
121 /*
Andrew F. Davis9e58d4d2017-06-29 08:38:25 -0500122 * Overwrite the image headers after authentication
123 * and decryption. Update size to reflect removal
Andrew F. Davisc1c564a2019-07-16 09:49:38 -0400124 * of header and restore original file size.
Andrew F. Davis9e58d4d2017-06-29 08:38:25 -0500125 */
Andrew F. Davisc1c564a2019-07-16 09:49:38 -0400126 *p_size = get_unaligned_le32(image + (*p_size - 4));
Andrew F. Davis9e58d4d2017-06-29 08:38:25 -0500127 memcpy(image, image + KS2_HS_SEC_HEADER_LEN, *p_size);
Vitaly Andrianove8d740f2017-04-07 10:00:03 -0500128
129 /*
130 * Output notification of successful authentication to re-assure the
131 * user that the secure code is being processed as expected. However
132 * suppress any such log output in case of building for SPL and booting
133 * via YMODEM. This is done to avoid disturbing the YMODEM serial
134 * protocol transactions.
135 */
136 if (!(IS_ENABLED(CONFIG_SPL_BUILD) &&
137 IS_ENABLED(CONFIG_SPL_YMODEM_SUPPORT) &&
138 spl_boot_device() == BOOT_DEVICE_UART))
139 printf("Authentication passed\n");
140}
141#endif